Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Enterprise MID

computer

QuestionAnswer
What are three elements of network Managment security, performance and reliability
What is the difference between manager and agent? Agents are devices or computers that send out alerts iwth software, Managers excute multiple actions notifications logging
what is MIB Management Information Database
What are management Proxies Entities that provide Management information on behalf of other entities
What is SNMP simple network management protocol
Why would you do a network audit Equipment info, location and operation. Audit defines what is normal
What is a baseline Baseline describes the normal status on the network, and provides a reference point
Name five types of Audits Inventory Audits, Facility audits, Operations Audit, Efficiency Audit, Security Audit
RFI Radio Frequency Interference
EMI Electromagnetic interference
What is SOAP Simple Object Access Protocol
What is NFS Network File Systems
What is RFC Request for COMMENTS
What is CIFS Common internet file system
WHAT is the SMB the same as CIFS
What does SMB stand for? Server Message Block
What is SAMBA A suite of Unix Applications that speak the SMB protocol
What is SMBD which provides the file and printer sharing services
What is NMBD NetBIOS name server
What is SFU and what can it DO? Service for UNIX, Provides file sharing remote access and admin, pass sync, common direcotyr management
What does SAN stand for Storage Area Network
What does NAS NETWORK attached storage
What DAS stand for Direct Attached Storage
What does SCSI stand for Small computer systems interface
What is Fibre Channel Transmitting data between computer at 1 GPS
What is iSCSI Internet Small Computer System Interface :a tech that allows data to be transported to and from storage devices over an IP network
what is the difference between postscript and PCL While PCL driver enables access to the maximum number of printer features, it offers limited capabilities. However, for everyday office color printing, this driver is recommended.
what is a WinPrinter Windows only printer drivers provided by the vendor
CUPS Common UNIX printing system
What is a Raster Graphics Editing of Grid like Pixels
Vector Graphics produce images using Mathematically Generated points lines and shapes
BIND? Berkeley Internet Name Domain
what is the purpose of using a proxy server To intercept all requests to the real server to see if it can fulfill the request itself. If not it forwards the request to the real server
What is a firewall A system Designed to prevent unauthorized access to an from a private network
Name three techniques used by firewalls Packet filter Application gateway Statefull inspection
IP spoofing is intruder sends messages to a computer with an ip address indicating that the message is coming from a trusted source
DMZ Demilitarized Zone
What is a Gateway A combination of hardware and software that links two different types of networks
What is an Extranet it is a computer network that allows controlled access from the outside, for specific business or educational purposes
XML eXtensible Markup Language
LDAP Lightweight Directory Access Protocol
ADSL Asymmetric Digital subscriber line
IMAP Internet Message Access Protocol
What is the difference between Unicode and ASCII Unicode = 16 bit ASCIi = 8 Bit
What is a MIME Multipurpose Internet Mail Extensions
MTA mail transfer agent
2 Examples Unix send mail and Exchange microsoft
What are two Examples of MUA Mail User agent Eudora Outlook
What does MAPI stand for? Messaging Application Programming Interface
What does CGI stand for? Common Gateway Interface
Name some technologies to create dynamic web sites. Java; Javascript; Perl; C/C++; ASP
What is a persistent connection in HTTP? is the idea of using a single TCP connection to send and receive multiple HTTP requests/responses, as opposed to opening a new connection for every single request/response pair.
What is multi‐threading? Execute different parts of a program, and can run multiple threads at the same time without interfering with each other.
What is inetd? An internet service daemon which manages internet services, handles web browser request
Describe load balancing using DNS as described in notes. Easiest ways to create a web site that can handle more hits, involves multiple copies of the site on separate physical servers, each server much be identical
What are problems with load balancing using DNS? Choose best answer. figuring out IP address each client will resolve the site name. 1 client per web server-site per visit 1 ip address will be highly loaded
How can you speed up web page access from a single server? Choose the best answer. By using a reverse proxy
What does SSL stand for? Secure Sockets Layer
What does TLS stand for? Transport Layer Security
What does XML stand for? Extensible Markup Language
What is a disadvantage of CGI? It tends to be slow because each request for a dynamic document relies on a new program being launched.
What advantage does servlets have over ASPs? • Servlets have an additional advantage over ASPs in that they become cached in the Java Virtual Machine after their first execution. • VBScript pages are reinterpreted each time they are hit.
What is Oracle? • Is the latest generation of the world's most popular RDBMS. • An Oracle database is a collection of data treated as a unit. The purpose of a database is to store and retrieve related information.
What does PHP now stand for? Hypertext Preprocessor
What port is used by default for HTTP? 80
What does JSP stand for? Java Server Pages
What is Apache? High-end enterprise-level server for Unix and Windows 95/98/NT platforms(Web Server)
What does RDB stand for? Relational Data Base
What does ASP stand for? Microsoft Active Server Pages
What does S/MIME stand for? Secure/Multipurpose Internet Mail Extensions
What does ANSI stand for? American National Standards Institute
What does SQL stand for? Structured Query Language
Name three email clients. MS Outlook/Outlook Express Netscape Messenger Eudora
What does URL stand for? Uniform Resource Locator
What does JDBC stand for? Java Database Connectivity
What does HTTP stand for? Hypertext Transfer Protoco
What does MHTML stand for? Multipurpose Internet Mail Extension Hypertext Markup Language
What is concurrency control? Database server software must establish rules to regulate access to multiple simultaneous users
What does NNTP stand for? Network News Transfer Protocol
What is Availability? the ability to support non-stop (24x7) operations.
Which of the following is an example of a URL? A Uniform Resource Locator (URL), in simple terms, is the address of a website eg. http://www.facebook.com/
Another term for Application Server is? middleware
What is Normalization? The process of organizing data to minimize redundancy
What is a differential backup? • Differential backups only contain data modified since the last full backup. • In the event of a database failure, a differential backup alone will be useless
What is a transaction log? is a mechanism to compensate for database changes made during the period of time between backups
What does it mean to rollback a transaction? • by rolling back any transaction which was active at the time of the crash, the database is restored to a consistent state.
What does LDAP stand for? Lightweight Directory Access Protocol
What does ‘Committed’ mean in database terms? • In the context of a database transaction, a commit refers to the saving of data permanently after a set of tentative changes
What is DB2? DB2 is a family of database server products developed by IBM
What is MySQL? Open source relational database system
Explain what three‐tiered means? database, client program, and application server
What does J2EE stand for? Java 2 Platform Enterprise Edition
What does ODBC stand for? Open Database Connectivity
What does SOAP stand for? Simple Object Access Protocol
What does DBMS stand for? database management system
What is Scalability? The ability to handle high, variable, and non-predictable transaction throughput.
What would let you log into a network, then access various resources without needing to provide your username.
What is more secure SSL or TLS? TLS has replaced SSL for the most part
Created by: Tranith